Compare the Top Log Management Software for Cloud as of December 2025 - Page 3

  • 1
    Reblaze

    Reblaze

    Reblaze

    Reblaze is the leading provider of cloud-native web application and API protection, providing a fully managed security platform. Reblaze’s all-in-one solution supports flexible deployment options (cloud, multi-cloud, hybrid, data center and service mesh), deployed in minutes and includes state-of-the-art Bot Management, API Security, next-gen WAF, DDoS protection, advanced rate limiting, session profiling, and more. Unprecedented real time traffic visibility as well as highly granular policies enables full control of your web traffic. Machine learning provides accurate, adaptive threat detection, while dedicated VPC deployment ensures maximum privacy, performance and protection while minimizing overhead costs. Reblaze customers include Fortune 500 companies and innovative organizations across the globe.
  • 2
    CybrHawk SIEM XDR
    CybrHawk is a leading provider of information security-driven risk intelligence solutions focused solely on protecting clients from cyber-attacks. We also pioneered an integrated approach that provides a wide range of cyber security solutions for organizations of varying size and complexity. Our solutions enable organizations to define their cyber defences to prevent security breaches, detect real-time malicious activity, prioritize and respond quickly to security breaches, and predict emerging threats. CybrHawk XDR provides all the critical tools: IDS, intelligence risk, behavior, machine learning & cloud info. The goal is to provide the entire enterprise with full and total control systems.
  • 3
    LOGalyze

    LOGalyze

    Zuriel

    LOGalyze is an open source, centralized log management and network monitoring software. If you would like to handle all of your log data in one place, LOGalyze is the right choice. It supports Linux/Unix servers, network devices, Windows hosts. It provides real-time event detection and extensive search capabilities. With this open source application log analyzer, collect your log data from any device, analyze, normalize and parse them with any custom made Log Definition, use the built-in Statistics and Report Definitions or use your own ones. You can define Events and Alerts by correlating any log data. The ticketing system provides powerful tool closing your open incidents more quickly. LOGalyze is an open source network management tool what helps reducing internal costs, improving network uptime, increasing network efficiency and eliminating unwanted network traffic. The built-in scheduled Reports give you an overview of the whole network.
  • 4
    EraSearch

    EraSearch

    Era Software

    Purpose-built for cloud-native deployments, EraSearch brings you a dynamic data fabric that leverages decoupled storage & compute, a true zero-schema design, and adaptive indexing to deliver an infinitely-scalable log management experience with an unparalleled reduction in cost and complexity. Lots of log management products are built on top of Elasticsearch. We built EraSearch from scratch to solve its key problems. By embracing a stateless design for all of the core components, managing EraSearch with k8s is a dream. Lots of log management products are built on top of Elasticsearch. We built EraSearch from scratch to solve its key problems. By using a modern, coordination-free ingest design, EraSearch can handle data at a greatly-reduced cost. Running EraSearch is completely hands-off, so you never have to worry about cluster health again.
    Starting Price: ¢65 per GB
  • 5
    opEvents

    opEvents

    Opmantek

    Configure your business policies to reflect your business environment. Set up to send alerts via SMS or email while following your escalation rules to one or more contacts. Outline your business hours to follow escalation or hierarchy differences and also allow for planned outages. Completely customizable notification settings that alert at the frequency that matches your demands. opEvents provides a centralised logging service for the purposes of operations, compliance and auditing. Complete management (centralised storage and audit capability) of logs from NMIS, applications, active directory, devices and cloud infrastructure. Enrich your network events with logs from multiple sources. Suppression and highlighting lists to ensure the right events generate notifications. Stateless and stateful events are applicable and events can be related to nodes. A set of normalized node properties are extracted and applied to the event.
    Starting Price: $649 per year
  • 6
    Seagence

    Seagence

    Seagence Technologies

    Using Seagence’s unique execution path technology combined with machine learning, receive realtime alerts with root cause when defects occur in your production Java applications. Fix your code without needing any debugging. Attach a lightweight runtime java agent when you start your application. As your users access the application, Seagence agent collects data about how requests are being processed. So give Seagence 24 hours to collect enough sample for analysis. The collected data is fed to Seagence's analytics engine in realtime which finds defects when they occur and alerts. Know that Seagence unearths all defects in your application including unknown. With Seagence provided defect and root cause in hand, you fix your broken code. Continuously monitoring your production application, Seagence proactively finds defects and their root cause in realtime thus eliminating the need for debugging.
    Starting Price: $52 per month
  • 7
    LOGIQ

    LOGIQ

    LOGIQ.AI

    LOGIQ.AI’s LogFlow provides centralized control of your observability data pipelines. As data streams arrive, they are automatically organized and optimized for your business teams and knowledge workers. XOps teams can centralize data flow management, gain data EPS control, and increase data quality and relevance. Built on any object store, LogFlow’s InstaStore enables infinite data retention and on-demand data replay to any target observability platform of your choice. Analyze operational metrics across applications and infrastructure and gain actionable insights that help you scale with confidence while maintaining high availability. Fuel business decisions and better user experiences by collecting, transforming, and analyzing behavioral data and usage patterns from business systems. Don’t let new attack techniques catch you off guard. Detect and analyze threat patterns from multiple sources and automate threat prevention and remediation.
  • 8
    Shoreline

    Shoreline

    Shoreline.io

    Shoreline is the Cloud Reliability platform — the only platform that lets DevOps engineers build automations in an afternoon, and fix issues forever. Shoreline reduces on-call complexity by running across clouds, Kubernetes clusters, and VMs allowing operators to manage their entire fleet as if it were a single box. Debugging and repairing issues is easy with advanced tooling for your best SREs, automated runbooks for the broader team, and a platform that makes building automations 30X faster. Shoreline does the heavy lifting, setting up monitors and building repair scripts, so that customers only need to configure them for their environment. Shoreline’s modern “Operations at the Edge” architecture runs efficient agents in the background of all monitored hosts. Agents run as a DaemonSet on Kubernetes or an installed package on VMs (apt, yum). The Shoreline backend is hosted by Shoreline in AWS, or deployed in your AWS virtual private cloud.
  • 9
    Trunc

    Trunc

    Trunc

    All your logs. One place. Troubleshoot errors, detect attacks, audit your users and solve compliance requirements with Trunc. Keep all your logs, easily accessible, with full-text logging search. Logs are automatically categorized, correlated and stored. Alerts and active response included.
    Starting Price: $10 per month
  • 10
    ALog ConVerter
    ALog ConVerter / ALog ConVerter DB automatically collects and analyzes access records (logs) for important data . With patented translation technology, A huge amount of data access records are extracted from complex system logs and compiled into an easy-to-read "access log" using the world's unique log analysis and conversion technology. Automatically learn file access frequency / access destination for each user. It scores unusual behaviors according to the degree of risk, revealing signs of fraud and attacks. By setting alerts / reports in advance, such as "Recording access to important folders", you can streamline the periodic checks / monitoring required for auditing. Monitor suspicious behavior from various perspectives, such as users who repeatedly fail to log on and users who repeatedly delete files.
  • 11
    Fortra Robot
    The Robot product line is designed and developed with operators in mind. Our modern interfaces and enterprise-class functionality make it possible for even novice IBM i teams to manage the system by exception, freeing up time to focus on IT initiatives that add value and impact the bottom line. Robot’s roots run deep. We’ve been part of the IBM i community for 35+ years. We know the platform inside and out. More importantly, we understand the people who manage it and the organizations who run on it. When you need a partner on IBM i—not just a vendor—you need Robot.
  • 12
    Quiver

    Quiver

    Castle Shield

    Quiver – Log Management Solutions that are Advanced & Easy-to-Use. Identify and mitigate threats, system breaches, & policy violations with Quiver™. Quiver™ is a cost-effective, powerful and flexible log management and log monitoring solution that combines complete log management with powerful correlation technology, real-time event log correlation and log monitoring, and an integrated incident response system – all on one appliance. Quiver™ offers organizations of all sizes and industries. Quiver™ provides an arsenal of log management, threat detection and risk reduction tools.
  • 13
    Netsurion

    Netsurion

    Netsurion

    Netsurion® is a managed open XDR solution that delivers greater attack surface coverage, guided threat remediation, and compliance management support. Our 24x7 SOC operates as your trusted cybersecurity partner, working closely with your IT team to strengthen your cybersecurity posture so you can confidently focus on your core business. Our smart, flexible packaging allows small- to mid-sized organizations to access​ advanced cybersecurity solutions at the most cost-effective price. And Netsurion is MSP-ready to protect your business and your clients through multi-tenant management, Open XDR to work with your existing security stack, and “Pay-as-you-Grow” pricing.
  • 14
    LOGZEN

    LOGZEN

    LOGZEN

    An application for checking syslog data stored in Elasticsearch. LogZEN is a tool for viewing syslog information stored inside Elasticsearch and consists of a python backend providing a ReST API and a frontend application. At the moment the project is getting restructured, meaning that there is no stable candidate for installation. LogZen is free software, you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation.
  • 15
    Shiftconnector
    Discover the interactive Shift Log. Shiftconnector® tracks and manages all important information that is needed at the time of the shift handover. Information is clearly compiled for supervisors. Reports can be accessed live at any time. Direct communication with the shift teams simplifies management. The data in Shiftconnector® can be analyzed to find optimization potential and sources of error, leading to improved business processes. Shiftconnector® GO connects field workers with board operators via the Shiftconnector platform for routine actions and compliance management. The app is available for iOS, Android and Windows, allowing workers to report activities directly from their mobile devices to a central location no matter where in the plant they are located. It offers a significant advantage to workers as they perform their daily inspection rounds about environment, safety and compliance activities in various locations throughout the plant.
  • 16
    Sonrai Security

    Sonrai Security

    Sonraí Security

    Identity and Data Protection for AWS, Azure, Google Cloud, and Kubernetes. Sonrai’s public cloud security platform provides a complete risk model of all identity and data relationships, including activity and movement across cloud accounts, cloud providers, and 3rd party data stores. Uncover all identity and data relationships between administrators, roles, compute instances, serverless functions, and containers across multi-cloud accounts and 3rd-party data stores. Inside the platform, our critical resource monitor continuously monitors your critical data sitting inside object stores (e.g. AWS S3, Azure Blob) and database services (e.g. CosmosDB, Dynamo DB, RDS). Privacy and compliance controls are monitored across multiple cloud providers and 3rd party data stores. Resolutions are coordinated with relevant DevSecOps teams.
  • 17
    Gravwell

    Gravwell

    Gravwell

    Gravwell is an all-you-can-ingest data fusion analytics platform that enables complete context and root cause analytics for security and business data. Gravwell was founded to bring the benefits of usable machine data to all customers: large or small, text or binary, security or operational. When experienced hackers and big data experts team-up you get an analytics platform capable of things never seen before. Gravwell enables security analytics that go well beyond log data into industrial processes, vehicle fleets, IT infrastructure, or everything combined. Need to hunt down a suspected access breach? Gravwell can correlate building access logs and run facial recognition machine learning against camera data to isolate multiple subjects entering a facility with a single badge-in. We exist to provide analytics capabilities to people who need more than just text log searching and need it sooner rather than later at a price they can afford.
  • 18
    NetWitness

    NetWitness

    NetWitness

    NetWitness Platform brings together evolved SIEM and threat defense solutions that deliver unsurpassed visibility, analytics and automated response capabilities. These combined capabilities help security teams work more efficiently and effectively, up-leveling their threat hunting skills and enabling them to investigate and respond to threats faster, across their organization’s entire infrastructure—whether in the cloud, on premises or virtual. Gives security teams the visibility they need to detect sophisticated threats hiding in today’s complex, hybrid IT infrastructures. Analytics, machine learning, and orchestration and automation capabilities make it easier for analysts to prioritize and investigate threats faster. Detects attacks in a fraction of the time of other platforms and connects incidents to expose the full attack scope. NetWitness Platform accelerates threat detection and response by collecting and analyzing data across more capture points.
  • 19
    AWS CloudTrail
    AWS CloudTrail is a service that enables governance, compliance, operational auditing, and risk auditing of your AWS account. With CloudTrail, you can log, continuously monitor, and retain account activity related to actions across your AWS infrastructure. CloudTrail provides event history of your AWS account activity, including actions taken through the AWS Management Console, AWS SDKs, command line tools, and other AWS services. This event history simplifies security analysis, resource change tracking, and troubleshooting. In addition, you can use CloudTrail to detect unusual activity in your AWS accounts. These capabilities help simplify operational analysis and troubleshooting. Detect unauthorized access using the Who, What, and When information in CloudTrail Events. Respond with rules-based EventBridge alerts and automated workflows. Continuously monitor API usage history using machine learning (ML) models to spot unusual activity in your AWS accounts, and determine root cause.
  • 20
    Rsyslog

    Rsyslog

    Adiscon

    RSYSLOG is the rocket-fast system for log processing. It offers high-performance, great security features and a modular design. While it started as a regular syslogd, rsyslog has evolved into a kind of swiss army knife of logging, being able to accept inputs from a wide variety of sources, transform them, and output to the results to diverse destinations. RSYSLOG can deliver over one million messages per second to local destinations when limited processing is applied. Even with remote destinations and more elaborate processing the performance is usually considered “stunning”.
  • 21
    Oracle Log Analytics Cloud Service
    Oracle Log Analytics Cloud Service monitors, aggregates, indexes, and analyzes all log data from your applications and infrastructure – enabling users to search, explore, and correlate this data to troubleshoot problems faster, derive operational insight, and make better decisions. Detect and respond to potential problems early. Work collaboratively between development and operations. Gain real-time operational insight across health and availability of applications.
  • 22
    Alibaba Log Service
    Log Service is a complete real-time data logging service that has been developed by Alibaba Group. Log Service supports collection, consumption, shipping, search, and analysis of logs, and improves the capacity of processing and analyzing large amounts of logs. Completes data collections from more than 30 data sources within five minutes. Deploys reliable high-availability service nodes in data centers around the world. Fully supports real-time and offline computing, and seamlessly connects to Alibaba Cloud software, open-source software, and commercial software. You can set the access permissions for individual rows so that the same report is displayed differently for each user role.
  • 23
    Centreon

    Centreon

    Centreon

    Centreon is a global provider of business-aware IT monitoring for always-on operations and performance excellence. The company’s holistic, AIOps-ready platform is designed for today’s complex, distributed hybrid cloud infrastructures. Centreon monitors the complete IT Infrastructure from Cloud-to-Edge for a clear and comprehensive view. Centreon removes blind spots, monitoring all equipment, middleware and applications that are part of modern IT workflows, from on-premise legacy assets to private and public cloud environments, all the way to the edge of the network, where smart devices and customers combine to create business value. Centreon is constantly current, able to support the most dynamic environments. With auto-discovery capabilities it can keep track of Software-Defined Network (SDN) elements, AWS or Azure cloud assets, Wi-Fi access points or any other component of today’s agile IT infrastructure.
  • 24
    OpenText Security Log Analytics
    OpenText™ Security Log Analytics is a scalable and user-friendly security operations platform designed to accelerate threat detection through comprehensive log management and big data analytics. It features a natural language-like querying interface that simplifies complex data searches, enabling security teams to visualize and analyze security events quickly and efficiently. The core columnar database ensures data immutability, enhancing trust and integrity in log management. This solution helps reduce analyst fatigue by streamlining threat hunting processes and automating repetitive remediation tasks. Integrated compliance reporting supports audit readiness for standards like GDPR, PCI, and FIPS 140-2. It also supports data ingestion from over 480 sources, providing a unified and normalized view for enhanced security visibility.
  • 25
    Tencent Cloud Log Service
    CLS offers a wealth of features, including real-time log collection, structured logging, reliable storage, rapid searches, multidimensional analysis and scheduled log shipping. The service also provides an extensive API and console for easy log management. CLS uses a scalable, distributed architecture that is highly elastic, allowing the simultaneous handling of massive quantities of logs. Users can process hundreds of millions of log files every day without the usual problems of resource provisioning. Logs are captured in real time and can be searched and analyzed as soon as they reach CLS. The powerful query engine can search hundreds of millions of files within a second, allowing vast quantity of log data to be analyzed and processed. CLS offers a variety of log aggregation methods, including the LogListener agent, API and SDK, enabling the easy collection and centralized management of logs. Initial deployment can be completed in just five minutes.
  • 26
    LogZilla

    LogZilla

    LogZilla

    LogZilla has developed a patented technology that breaks through network telemetry indicators to deliver real-time and intelligent insight for enterprise networks worldwide. LogZilla’s Network Event Orchestrator™ (NEO) engine enables network and security teams to identify and resolve network problems before they become costly downtime situations. CEO's must increase the data ingestion to support future business growth. Extend data protection to any network edge environment, and back. Meet 100% regulation and obtain complete visibility of a data’s destinations. Get data functionality to identify business opportunities and threats. Orchestrate events and automatically design and execute data’s course.
  • 27
    LogMan.io

    LogMan.io

    TeskaLabs

    TeskaLabs Logman.io is a modern and effective tool for log management, collection, archiving, and log analysis. Scalable Log Management can be easily upgraded to the full-scale tool TeskaLabs SIEM (security information and event management). Be always one step ahead of all potential threats and achieve a total overview of the security of your IT infrastructure. Thanks to timely and clear threat detection, TeskaLabs LogMan.io protects important data and sensitive information. TeskaLabs is a cybersecurity expert and therefore all our products meet the security standards of your company. LogMan.io ensures regulatory compliance with legislation covering cyber security and GDPR. Logman.io can grow with your needs. It can be easily upgraded to TeskaLabs SIEM. You can promptly get a central essential overview of the entire IT infrastructure, a full-scale tool for threat modeling, risk management, and vulnerability scanning.
  • 28
    Baidu AI Cloud Log Service
    Relying on the technical advantages of cloud computing and big data, you only need to deploy the configuration and collect, aggregate, and efficiently transmit the massive logs at a low cost. So, you can cope with various business scenarios easily, such as equipment operations and management, business trend insight, security monitoring, and audit. It can compress the log data for transmission, and supports multiple compression formats, effectively reducing the storage cost and saving the transmission bandwidth. It provides the simple and easy-to-use installation, management, and upgrading features of the collector to ensure stable operation. It provides the hosted service mode, which can be easily used with a simple deployment without the investment in development and operations.
  • 29
    Yandex Cloud Logging
    The service aggregates runtime data from different resources into a log group. Use pre-configured log groups or create new ones for selected services and applications. Filter entries using queries. When working with Cloud Logging, you can use logical operators, search by parameters, or search within JSON parameters. Cloud Logging collects, processes, and stores logs for up to 31 days. An isolated data storage space is allocated for each log group. You can configure read and write access using roles. Add data from Cloud Logging and diagnostic information from other systems integrated with Grafana to one dashboard.
  • 30
    DataBahn

    DataBahn

    DataBahn

    DataBahn.ai is redefining how enterprises manage the explosion of security and operational data in the AI era. Our AI-powered data pipeline and fabric platform helps organizations securely collect, enrich, orchestrate, and optimize enterprise data—including security, application, observability, and IoT/OT telemetry—for analytics, automation, and AI. With native support for over 400 integrations and built-in enrichment capabilities, DataBahn streamlines fragmented data workflows and reduces SIEM and infrastructure costs from day one. The platform requires no specialist training, enabling security and IT teams to extract insights in real time and adapt quickly to new demands. We've helped Fortune 500 and Global 2000 companies reduce data processing costs by over 50% and automate more than 80% of their data engineering workloads.